Back to top

Computer Security

This is where information on security for computers and data will be.

This page is under constructon.

Passwords:

Passwords should be complex:  Minimum 8 characters with at least 1 number and 1 capital letter.  Example:  1Camaro2

Better is if a a special character such as #, !, *, $ is used too.  Also, use more than 8 characters.  Example:  !Chev1Camaro2#

Best password is if it is random or use a phrase and replace some letters with another character.  Example:  Replace a with @, e with 3, o with 0, S with $, etc..  Example:  !Acd5#43Bsg67%!

Do not use:  numbers from social security number, drivers license, birthdays, address. Anything that might help a hacker determine what your password is or facilitate identity theft.

------------------------------------------------------------------------------------

File Storage:

Computer Labs:

Save files to a jump drive or a network folder.   The network folder can be created by the Tech.  Coordinator and mapped to your computer.  Also, permissions/restrictions can be configured on the folder.

Do not save to the default documents folder or desktop because of the log in profile becomes corrupted, that data may not be recoverable.

 

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Email Security:

Follow this EMAIL SAFETY CHECKLIST to know if it IS or is NOT safe to open an email.

Overall rule is if you do not know or are not sure where it came from, then delete it.

IS THIS EMAIL/ATTACHMENT OK TO OPEN  

  1. Is the email from someone you don’t know or recognize    YES   /   NO 
  2. IF YES, DELETE DELETE DELETE
  3. IF NO, GOTO Next step.
  4. Is the email talking about something that DOES NOT fully relate to you or your position      YES   / NO
  5. IF YES, DELETE DELETE DELETE
  6. IF NO, GOTO Next step.
  7. Does the email have an attached file that IS a Word (.docx) or Adobe (.pdf)     YES   /  NO
  8. IF NO, DELETE DELETE DELETE
  9. IF YES, MAKE SURE YOU ANSWERED NO to #1 and #2 ABOVE before you open the file
  10. If the file attached or downloaded is a .zip file and you opened the zipattachment, does it have a .js, .bat, .exe    YES    /  NO
  11. IF YES, DELETE DELETE DELETE
  12. IF NO, CAN YOU ANSWER NO TO #1 and #2, IF YOU CAN, THEN GOTO next step.
  13. The zip file is probably safe to open and only open
  14. (IF YOU ARE UNSURE, ask for help or just delete it.  If you do not know who sent the zip file or you were not expecting it, then delete it.